Skip to main content

previous disabled Page of 12
and
  1. No Access

    Chapter and Conference Paper

    Extension of Resource Authorization Method with SSI in Edge Computing

    The authors have previously confirmed that the flow of OAuth, a traditional authorization method on the Internet, can be managed appropriately by applying it to allocating computational resources in edge compu...

    Ryu Watanabe, Ayumu Kubota, Jun Kurihara in Advanced Information Networking and Applic… (2024)

  2. No Access

    Chapter and Conference Paper

    Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies

    Adversarial attacks pose a significant threat to the reliability and security of deep learning models, particularly in image processing applications. Defending against these sophisticated manipulations require...

    Haibo Zhang, Kouichi Sakurai in Advanced Information Networking and Applications (2024)

  3. No Access

    Chapter and Conference Paper

    SoK: Directions and Issues in Formal Verification of Payment Protocols

    Consumers use various payment methods to purchase goods and services from retailers, such as cash, credit cards, debit cards, prepaid cards, and barcodes/two-dimensional codes. In the past, in the case of in-s...

    Hideki Sakurada, Kouichi Sakurai in Advanced Information Networking and Applications (2024)

  4. No Access

    Chapter and Conference Paper

    Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds

    The DDoS attack remains one of the leading attacks today. To reduce the number of resource-consuming detection algorithm calls, the trigger-based two-stage detection approach has been proposed. In such systems...

    Yang Lyu, Yaokai Feng, Kouichi Sakurai in Advanced Information Networking and Applications (2024)

  5. No Access

    Chapter and Conference Paper

    Enhancing Security and Efficiency: A Lightweight Federated Learning Approach

    Recently, as big data and AI technology advance, data privacy and security are increasingly critical. Federated Learning (FL) has become a key solution in machine learning to address these concerns. In this pa...

    Chunlu Chen, Kevin I-Kai Wang, Peng Li in Advanced Information Networking and Applic… (2024)

  6. No Access

    Article

    A Review on Machine Unlearning

    Recently, an increasing number of laws have governed the useability of users’ privacy. For example, Article 17 of the General Data Protection Regulation (GDPR), the right to be forgotten, requires machine learnin...

    Haibo Zhang, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai in SN Computer Science (2023)

  7. No Access

    Chapter and Conference Paper

    POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance

    Federated Learning (FL) and the Internet of Things (IoT) have transformed data processing and analysis, overcoming traditional cloud computing limitations. However, challenges such as catastrophic forgetting i...

    Chunlu Chen, Kevin I-Kai Wang, Peng Li in Applied Cryptography and Network Security … (2023)

  8. No Access

    Chapter and Conference Paper

    Towards Evaluating the Security of Human Computable Passwords Using Neural Networks

    Passwords are playing a major role for authentication in our daily life. However contemporary passwords are typically either difficult to remember or vulnerable to various attacks. In 2017, Blocki, Blum, Datta...

    Issei Murata, Pengju He, Yujie Gu, Kouichi Sakurai in Information Security Applications (2023)

  9. No Access

    Chapter and Conference Paper

    POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses

    Over the past decade, the development of both adversarial attack methods and defense strategies has accelerated rapidly. Classification accuracy has been predominantly used as the sole metric for assessing mod...

    Haibo Zhang, Zhihua Yao, Kouichi Sakurai in Applied Cryptography and Network Security … (2023)

  10. No Access

    Chapter and Conference Paper

    A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network

    Temporal Convolution Network(TCN) has recently been introduced in the cybersecurity field, where two types of TCNs that consider causal relationships are used: causal TCN and non-causal TCN. Previous researche...

    Pengju He, Haibo Zhang, Yaokai Feng, Kouichi Sakurai in Science of Cyber Security (2023)

  11. No Access

    Chapter and Conference Paper

    Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir’s Secret Sharing Scheme

    This paper delivers a post-quantum construction for group-oriented attribute-based encryption (GO-ABE) using lattice-based cryptography. The GO-ABE scheme enables users from the same group to combine their att...

    Maharage Nisansala Sevwandi Perera, Toru Nakamura in Network and System Security (2023)

  12. No Access

    Chapter and Conference Paper

    Explicit Non-malleable Codes from Bipartite Graphs

    Non-malleable codes are introduced to protect the communication against adversarial tampering of data, as a relaxation of the error-correcting codes and error-detecting codes. To explicitly construct non-malle...

    Shohei Satake, Yujie Gu, Kouichi Sakurai in Arithmetic of Finite Fields (2023)

  13. No Access

    Chapter and Conference Paper

    Eliminating Adversarial Perturbations Using Image-to-Image Translation Method

    Convolutional neural networks are widely used for image recognition tasks, but they are vulnerable to adversarial attacks that can cause the model to misclassify an image. Such attacks pose a significant secur...

    Haibo Zhang, Zhihua Yao, Kouichi Sakurai in Applied Cryptography and Network Security … (2023)

  14. No Access

    Chapter and Conference Paper

    Tree Parity Machine-Based Symmetric Encryption: A Hybrid Approach

    In a symmetric key encryption the sender and the receiver must possess the same pre-distributed key in order to encrypt or decrypt the exchanged messages. Exchanging symmetric keys is a challenging issue in cr...

    Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai in Mathematics and Computing (2022)

  15. No Access

    Chapter and Conference Paper

    Key Exchange Using Tree Parity Machines: A Survey

    Secure key exchange is an important step to secure a communication. When multiple parties are using a symmetric key encryption protocol, they need a secret key to exchange encrypted messages. If the key is com...

    Ishak Meraouche, Kouichi Sakurai in Proceedings of 2nd International Conferenc… (2022)

  16. No Access

    Chapter and Conference Paper

    A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem

    Sharing microdata is a very important part of the present day world, but when they contain sensitive information, privacy to individuals needs to be guaranteed before release of data. One idea is to study the ...

    Debolina Ghatak, Kouichi Sakurai in Science of Cyber Security - SciSec 2022 Workshops (2022)

  17. No Access

    Chapter and Conference Paper

    Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities

    This paper proposes a group signature scheme with a tracing mechanism that limits the tracing ability of tracers based on their attributes and decentralizes the tracing key generation method. Thus, no other pa...

    Maharage Nisansala Sevwandi Perera in Information Security Practice and Experien… (2022)

  18. No Access

    Chapter and Conference Paper

    Advances in Adversarial Attacks and Defenses in Intrusion Detection System: A Survey

    Machine learning is one of the predominant methods used in computer science and has been widely and successfully applied in many areas such as computer vision, pattern recognition, natural language processing,...

    Mariama Mbow, Kouichi Sakurai, Hiroshi Koide in Science of Cyber Security - SciSec 2022 Wo… (2022)

  19. No Access

    Book and Conference Proceedings

    Science of Cyber Security

    4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers

    Chunhua Su, Kouichi Sakurai, Feng Liu in Lecture Notes in Computer Science (2022)

  20. No Access

    Book and Conference Proceedings

    Science of Cyber Security - SciSec 2022 Workshops

    AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers

    Chunhua Su, Kouichi Sakurai in Communications in Computer and Information Science (2022)

previous disabled Page of 12